Analysis

  • max time kernel
    93s
  • max time network
    112s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-01-2025 06:50

General

  • Target

    774341277a7503097d574a8d34ec19abae11986e3d14925de81bdd680eac050dN.exe

  • Size

    2.2MB

  • MD5

    889f050ef7bc85238ef3ba17c1ca8530

  • SHA1

    5168769f30a3efbf81ec2174c84d4290882b4c08

  • SHA256

    774341277a7503097d574a8d34ec19abae11986e3d14925de81bdd680eac050d

  • SHA512

    4a7c67efba35f6e12d2953466e8e7b3a05254ae1fc0cfd43cb16d9cb50bc4e69bdfb44d25d8555b36d7a6096a8a3c8c160de1cd03ee022c5a57681c59c7bf0ef

  • SSDEEP

    49152:ssSHlG56vO0T3/Nh/ptuw/C3TqGaDxr1NcWTMUvif:sLlK6d3/Nh/bV/Oq3Dxp2RUG

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Modifies WinLogon for persistence 2 TTPs 17 IoCs
  • Process spawned unexpected child process 51 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 9 IoCs
  • DCRat payload 8 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Drops file in Drivers directory 1 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 34 IoCs
  • Checks whether UAC is enabled 1 TTPs 6 IoCs
  • Drops file in Program Files directory 40 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 51 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • System policy modification 1 TTPs 9 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\774341277a7503097d574a8d34ec19abae11986e3d14925de81bdd680eac050dN.exe
    "C:\Users\Admin\AppData\Local\Temp\774341277a7503097d574a8d34ec19abae11986e3d14925de81bdd680eac050dN.exe"
    1⤵
    • Modifies WinLogon for persistence
    • UAC bypass
    • Drops file in Drivers directory
    • Checks computer location settings
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:4272
    • C:\Recovery\WindowsRE\dllhost.exe
      "C:\Recovery\WindowsRE\dllhost.exe"
      2⤵
      • UAC bypass
      • Checks computer location settings
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:5028
      • C:\Windows\System32\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\d3c81f6c-abd3-4ccb-9350-22250db16995.vbs"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3332
        • C:\Recovery\WindowsRE\dllhost.exe
          C:\Recovery\WindowsRE\dllhost.exe
          4⤵
          • UAC bypass
          • Checks computer location settings
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • Modifies registry class
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:1536
          • C:\Windows\System32\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\6685cb51-1662-4b61-aac7-b481cbfd22c1.vbs"
            5⤵
              PID:1836
              • C:\Recovery\WindowsRE\dllhost.exe
                C:\Recovery\WindowsRE\dllhost.exe
                6⤵
                  PID:1096
              • C:\Windows\System32\WScript.exe
                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\553d6a82-be5d-44d4-b79d-b451555bdc06.vbs"
                5⤵
                  PID:2364
            • C:\Windows\System32\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\7aa9cd8a-c3b8-468d-b719-6b65ef3e2d81.vbs"
              3⤵
                PID:1796
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "sysmons" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Windows Photo Viewer\it-IT\sysmon.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1696
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "sysmon" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Photo Viewer\it-IT\sysmon.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2080
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "sysmons" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Windows Photo Viewer\it-IT\sysmon.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1888
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\SearchApp.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:440
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "SearchApp" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\SearchApp.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:3496
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\SearchApp.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:3304
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 8 /tr "'C:\Users\Admin\SppExtComObj.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:968
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\Users\Admin\SppExtComObj.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2916
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 9 /tr "'C:\Users\Admin\SppExtComObj.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:4992
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 5 /tr "'C:\Program Files\VideoLAN\VLC\locale\Idle.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:5060
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Program Files\VideoLAN\VLC\locale\Idle.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2520
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 5 /tr "'C:\Program Files\VideoLAN\VLC\locale\Idle.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2236
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "774341277a7503097d574a8d34ec19abae11986e3d14925de81bdd680eac050dN7" /sc MINUTE /mo 12 /tr "'C:\Program Files\Windows NT\TableTextService\en-US\774341277a7503097d574a8d34ec19abae11986e3d14925de81bdd680eac050dN.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2700
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "774341277a7503097d574a8d34ec19abae11986e3d14925de81bdd680eac050dN" /sc ONLOGON /tr "'C:\Program Files\Windows NT\TableTextService\en-US\774341277a7503097d574a8d34ec19abae11986e3d14925de81bdd680eac050dN.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2384
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "774341277a7503097d574a8d34ec19abae11986e3d14925de81bdd680eac050dN7" /sc MINUTE /mo 6 /tr "'C:\Program Files\Windows NT\TableTextService\en-US\774341277a7503097d574a8d34ec19abae11986e3d14925de81bdd680eac050dN.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1372
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\System.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:3968
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\System.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:3612
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\System.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:4540
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "sysmons" /sc MINUTE /mo 7 /tr "'C:\Recovery\WindowsRE\sysmon.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:3376
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "sysmon" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\sysmon.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:4616
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "sysmons" /sc MINUTE /mo 7 /tr "'C:\Recovery\WindowsRE\sysmon.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2552
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "smsss" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\smss.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1828
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\smss.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2828
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "smsss" /sc MINUTE /mo 7 /tr "'C:\Recovery\WindowsRE\smss.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:864
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\Idle.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1840
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\Idle.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:4600
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 5 /tr "'C:\Recovery\WindowsRE\Idle.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:316
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 5 /tr "'C:\Recovery\WindowsRE\dllhost.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1864
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\dllhost.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1244
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\dllhost.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1880
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\dllhost.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:3120
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\dllhost.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:4880
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\dllhost.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:4420
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\taskhostw.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:4716
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\taskhostw.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2740
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\taskhostw.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:4004
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 11 /tr "'C:\Users\All Users\Registry.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1884
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "Registry" /sc ONLOGON /tr "'C:\Users\All Users\Registry.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:3840
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 10 /tr "'C:\Users\All Users\Registry.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2488
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\lsass.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:4756
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\lsass.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2272
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 5 /tr "'C:\Recovery\WindowsRE\lsass.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:3264
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 9 /tr "'C:\Users\All Users\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\updates\Registry.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:4460
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "Registry" /sc ONLOGON /tr "'C:\Users\All Users\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\updates\Registry.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:4344
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 10 /tr "'C:\Users\All Users\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\updates\Registry.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:332
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 13 /tr "'C:\Program Files\Uninstall Information\SearchApp.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:4896
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "SearchApp" /sc ONLOGON /tr "'C:\Program Files\Uninstall Information\SearchApp.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:3924
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 7 /tr "'C:\Program Files\Uninstall Information\SearchApp.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:4184
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "smsss" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\WindowsPowerShell\smss.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2092
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Program Files (x86)\WindowsPowerShell\smss.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1996
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "smsss" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\WindowsPowerShell\smss.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1356

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\System.exe

            Filesize

            2.2MB

            MD5

            2e78bf40bc4f79dc25976dd02c331102

            SHA1

            af90e12596c2b77de0a76ea3128fb54d99d7e952

            SHA256

            070da20a7d0d49cec2139d452068fc82d152a3fcb1b8307c545b6972cafb1880

            SHA512

            42be844996a96948362cc0ef212326dc0547f52f17362697876bab93c8d016bd43cde44447f56a6e1818aaa185b7db8b22768576cdf1cb5d3aa9410637211ce9

          • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\dllhost.exe

            Filesize

            2.2MB

            MD5

            f3b5de39fedc78fac0e338c1d2be1d6b

            SHA1

            d3fd2b4032f7621caf8cbb4d26c026dd37d4a265

            SHA256

            4e22554dbb76b0da99612aa23602189efc23dca2897270bf431a5616cdb2f3ce

            SHA512

            75e79322cfaa705256aa6ff94286dbee48fa20b83687cb68660fbb640d57bbef3e069ffe17bbf47ac0a8352af0edcac1df08b5d572c15542d67cfc74a1ba6121

          • C:\Program Files (x86)\WindowsPowerShell\smss.exe

            Filesize

            2.2MB

            MD5

            f97e1152ecfc54d43d25790b51c36dbe

            SHA1

            d91bf94d573d00ec39d05f87548b8d92502dfe6f

            SHA256

            de1b05f9ed4a1c9ed0f6a0908aeb4c182cfe07b58d6f41f20ee9b9a3c0944316

            SHA512

            0dbdc4a9d5bbcfa023598dd4173fc10d6931c766121117b660cbed01a0044f267f7044cf7991177797cd450f4c114494578384210988aa66fc4a98116ad26554

          • C:\Program Files\Uninstall Information\SearchApp.exe

            Filesize

            2.2MB

            MD5

            537ce6d8cc5e7efa3c325b45f60c801b

            SHA1

            af4abd71bbc9984227194b882e79c83974b5dbcb

            SHA256

            7e3075689f61a8a4bd15a334fb527874a7ec611e5d35ff27c2b3b9f57ed21132

            SHA512

            8cc22f0aac7db5346e3b989a2ba9f907e41b9c0a8942928fb00e4ef9645b0cfb9533d02b4df8f88d9aa21048e0604db55a5eee69ebc10aa82b7395aad329d617

          • C:\Program Files\Windows NT\TableTextService\en-US\774341277a7503097d574a8d34ec19abae11986e3d14925de81bdd680eac050dN.exe

            Filesize

            2.2MB

            MD5

            889f050ef7bc85238ef3ba17c1ca8530

            SHA1

            5168769f30a3efbf81ec2174c84d4290882b4c08

            SHA256

            774341277a7503097d574a8d34ec19abae11986e3d14925de81bdd680eac050d

            SHA512

            4a7c67efba35f6e12d2953466e8e7b3a05254ae1fc0cfd43cb16d9cb50bc4e69bdfb44d25d8555b36d7a6096a8a3c8c160de1cd03ee022c5a57681c59c7bf0ef

          • C:\Recovery\WindowsRE\SearchApp.exe

            Filesize

            2.2MB

            MD5

            49ad47cd26c17f5d4031b79d08797e09

            SHA1

            e91916a02c270ae9dd8dab60889f6943cb33a81f

            SHA256

            e337085f1336c6b9a71db7fd72253c756c973ace53dfd6c36659a5869e9f934e

            SHA512

            e79c6489260b571f433678395730c3649f563757aab0577fae95d43ef61c91f2b57124aaf9202e43e5094e734d19a8efbfa9c5371360d21d6b84e8a104e536a3

          • C:\Recovery\WindowsRE\dllhost.exe

            Filesize

            57KB

            MD5

            51009e9552ef32c31134a70da625f52e

            SHA1

            58d475e425ce3c9ff85e2a32d18ffcafa5c7d4ba

            SHA256

            1fbd344730c5a21f7713aaf1100bda70cf31dfd181d76825acc5502055983733

            SHA512

            e7bedabe708721f93df20281d2de1a04178cce8391b3be3abe2c733b7b149f3aaa67b55f280dde23fba2dd6dabf61679f2d9bd3a5be0d40f5bdfa2574c7e4efb

          • C:\Recovery\WindowsRE\lsass.exe

            Filesize

            2.2MB

            MD5

            b1117c6c7bfb697f13dac2d1cc28909d

            SHA1

            d1b0a80df7f8758f43ae6f7e2bf49b07d4a3da0f

            SHA256

            fd298b25c7f2a95cbe2bd45a23a63ded1cfc1f63df5cfc8faeb89f6746aa0178

            SHA512

            cfde1164b0ed88ac88a040277e76aca9a046509c164c7a4c08871df4e6eb73630efd1376d186b3beeba210b86073c42122a19289d938b15f38562cd1927d52b3

          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\dllhost.exe.log

            Filesize

            1KB

            MD5

            49b64127208271d8f797256057d0b006

            SHA1

            b99bd7e2b4e9ed24de47fb3341ea67660b84cca1

            SHA256

            2a5d403a2e649d8eceef8f785eeb0f6d33888ec6bbf251b3c347e34cb32b1e77

            SHA512

            f7c728923c893dc9bc88ad2159e0abcda41e1b40ff7e7756e6252d135ed238a2248a2662b3392449836dd1b0b580f0c866cc33e409527484fe4602e3d3f10e3e

          • C:\Users\Admin\AppData\Local\Temp\6685cb51-1662-4b61-aac7-b481cbfd22c1.vbs

            Filesize

            709B

            MD5

            249188c117571f131636ccedafeb2e55

            SHA1

            d4b4b7d3ca785a968fd5cd937e9894d9f6410d13

            SHA256

            589440af8d10fcdf47b780e373efc0ba98cb0dcc7a5ee6413957e3c9243e700b

            SHA512

            512a02f5ff6a448ad7628ed59d350ba35e5b387a806549f33977af58f2841798112cf6423ada9a783327b5bd44fb5caf8ab805b39327651abdcf09f73636d43f

          • C:\Users\Admin\AppData\Local\Temp\7aa9cd8a-c3b8-468d-b719-6b65ef3e2d81.vbs

            Filesize

            485B

            MD5

            62837da4e1b201ac3f2cf9c4b827421a

            SHA1

            963204357f81ed21121f7edf33f3747880925463

            SHA256

            87d3314b25300eea5c5dfe451ca2916b94358fa4766d54720182ea4d6edf7688

            SHA512

            5ef873880c29c6c94f6f70681c3d64642c5017a0f0deac9b2182304802ca41f1c4614c6c8a6f3a1a3dcea2a9104ba20a2f99fc1a25ba63b7212fd3ac61cd72f3

          • C:\Users\Admin\AppData\Local\Temp\d3c81f6c-abd3-4ccb-9350-22250db16995.vbs

            Filesize

            709B

            MD5

            278492872caa2725525426f04b3aac62

            SHA1

            695cc7714f4a6d8f3b5e2a3c7324d0b127434b7e

            SHA256

            25e68469451d5873a879ea32b138493cceea022745df013cf7d668bba3c23dac

            SHA512

            20678d0af63a9593e616b250b68990f122d123762573317b48866e72499494f006cccc5fcd87a428b257f67537776632c5d2cc268323e7c6d4c2e66decf553f9

          • memory/4272-28-0x000000001C460000-0x000000001C46C000-memory.dmp

            Filesize

            48KB

          • memory/4272-34-0x00007FFAD9D80000-0x00007FFADA841000-memory.dmp

            Filesize

            10.8MB

          • memory/4272-14-0x000000001B9F0000-0x000000001B9FC000-memory.dmp

            Filesize

            48KB

          • memory/4272-15-0x000000001BA00000-0x000000001BA08000-memory.dmp

            Filesize

            32KB

          • memory/4272-16-0x000000001BA10000-0x000000001BA1C000-memory.dmp

            Filesize

            48KB

          • memory/4272-17-0x000000001BA20000-0x000000001BA28000-memory.dmp

            Filesize

            32KB

          • memory/4272-19-0x000000001BA30000-0x000000001BA42000-memory.dmp

            Filesize

            72KB

          • memory/4272-20-0x000000001C730000-0x000000001CC58000-memory.dmp

            Filesize

            5.2MB

          • memory/4272-21-0x000000001BA60000-0x000000001BA6C000-memory.dmp

            Filesize

            48KB

          • memory/4272-22-0x000000001C200000-0x000000001C20C000-memory.dmp

            Filesize

            48KB

          • memory/4272-23-0x000000001C210000-0x000000001C21C000-memory.dmp

            Filesize

            48KB

          • memory/4272-24-0x000000001C320000-0x000000001C32A000-memory.dmp

            Filesize

            40KB

          • memory/4272-0-0x00007FFAD9D83000-0x00007FFAD9D85000-memory.dmp

            Filesize

            8KB

          • memory/4272-27-0x000000001C450000-0x000000001C45E000-memory.dmp

            Filesize

            56KB

          • memory/4272-29-0x000000001C4B0000-0x000000001C4B8000-memory.dmp

            Filesize

            32KB

          • memory/4272-31-0x000000001C4C0000-0x000000001C4CC000-memory.dmp

            Filesize

            48KB

          • memory/4272-26-0x000000001C340000-0x000000001C348000-memory.dmp

            Filesize

            32KB

          • memory/4272-25-0x000000001C330000-0x000000001C33E000-memory.dmp

            Filesize

            56KB

          • memory/4272-30-0x00007FFAD9D80000-0x00007FFADA841000-memory.dmp

            Filesize

            10.8MB

          • memory/4272-13-0x000000001B9E0000-0x000000001B9EA000-memory.dmp

            Filesize

            40KB

          • memory/4272-6-0x000000001B990000-0x000000001B9E0000-memory.dmp

            Filesize

            320KB

          • memory/4272-7-0x0000000002F40000-0x0000000002F48000-memory.dmp

            Filesize

            32KB

          • memory/4272-8-0x0000000002F50000-0x0000000002F60000-memory.dmp

            Filesize

            64KB

          • memory/4272-142-0x00007FFAD9D83000-0x00007FFAD9D85000-memory.dmp

            Filesize

            8KB

          • memory/4272-167-0x00007FFAD9D80000-0x00007FFADA841000-memory.dmp

            Filesize

            10.8MB

          • memory/4272-9-0x0000000002F60000-0x0000000002F76000-memory.dmp

            Filesize

            88KB

          • memory/4272-202-0x00007FFAD9D80000-0x00007FFADA841000-memory.dmp

            Filesize

            10.8MB

          • memory/4272-227-0x00007FFAD9D80000-0x00007FFADA841000-memory.dmp

            Filesize

            10.8MB

          • memory/4272-10-0x0000000002F80000-0x0000000002F8C000-memory.dmp

            Filesize

            48KB

          • memory/4272-11-0x0000000002F90000-0x0000000002F98000-memory.dmp

            Filesize

            32KB

          • memory/4272-12-0x0000000002FA0000-0x0000000002FB0000-memory.dmp

            Filesize

            64KB

          • memory/4272-308-0x00007FFAD9D80000-0x00007FFADA841000-memory.dmp

            Filesize

            10.8MB

          • memory/4272-5-0x0000000002F20000-0x0000000002F3C000-memory.dmp

            Filesize

            112KB

          • memory/4272-4-0x0000000002F10000-0x0000000002F1E000-memory.dmp

            Filesize

            56KB

          • memory/4272-3-0x0000000002F00000-0x0000000002F0E000-memory.dmp

            Filesize

            56KB

          • memory/4272-2-0x00007FFAD9D80000-0x00007FFADA841000-memory.dmp

            Filesize

            10.8MB

          • memory/4272-1-0x0000000000AC0000-0x0000000000CEE000-memory.dmp

            Filesize

            2.2MB